Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250218-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250218-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    11/03/2025, 20:02

General

  • Target

    setup.exe

  • Size

    709.0MB

  • MD5

    cffa59bdc566b21e6f3b7bbd7d1b943a

  • SHA1

    7319cf3c26228d14c6fb4495519cef5df4cb05ac

  • SHA256

    99a35657f5582f935c761d1b5f6d9b9c859b017bca9178b06231f2b5ce0eeec6

  • SHA512

    48b0f52a6c707efa938ef8f983e6043946b4c748e1dcb7a9aa0f4668a3fda4015ab8691791421f24c53afb5cc384788465bca2168de62c398ce3244b78308a7a

  • SSDEEP

    98304:tw3DAfSsGlM8u5FJSGIfheKutJtjovjuY1uXoY7CQ:MySsGiHrKuJkL6x

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 1 IoCs
  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Privateloader family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 8 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Modifies firewall policy service
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1732
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
    1⤵
      PID:4304
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
      1⤵
      • Drops file in Windows directory
      PID:692

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\System32\GroupPolicy\gpt.ini

      Filesize

      127B

      MD5

      8ef9853d1881c5fe4d681bfb31282a01

      SHA1

      a05609065520e4b4e553784c566430ad9736f19f

      SHA256

      9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2

      SHA512

      5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

    • memory/1732-10-0x00007FF661D40000-0x00007FF662813000-memory.dmp

      Filesize

      10.8MB

    • memory/1732-7-0x00007FF9D0F70000-0x00007FF9D102D000-memory.dmp

      Filesize

      756KB

    • memory/1732-6-0x00007FF9D0F8B000-0x00007FF9D0F8C000-memory.dmp

      Filesize

      4KB

    • memory/1732-9-0x00007FF661D40000-0x00007FF662813000-memory.dmp

      Filesize

      10.8MB

    • memory/1732-8-0x00007FF661D40000-0x00007FF662813000-memory.dmp

      Filesize

      10.8MB

    • memory/1732-0-0x00007FF661D40000-0x00007FF662813000-memory.dmp

      Filesize

      10.8MB

    • memory/1732-1-0x00007FF661D40000-0x00007FF662813000-memory.dmp

      Filesize

      10.8MB

    • memory/1732-11-0x00007FF661D40000-0x00007FF662813000-memory.dmp

      Filesize

      10.8MB

    • memory/1732-19-0x00007FF661D40000-0x00007FF662813000-memory.dmp

      Filesize

      10.8MB

    • memory/1732-20-0x00007FF9D0F70000-0x00007FF9D102D000-memory.dmp

      Filesize

      756KB

    • memory/1732-23-0x00007FF661D40000-0x00007FF662813000-memory.dmp

      Filesize

      10.8MB

    • memory/1732-24-0x00007FF9D0F70000-0x00007FF9D102D000-memory.dmp

      Filesize

      756KB